Kenna Blog
Thoughtful perspectives on Modern Vulnerability Management.
Introducing Kenna’s Vuln of the Month Series
Kenna Security’s research team is following closely a remote code execution vulnerability in Microsoft Defender (CVE-2021-1647). Our research shows that CVE-2021-1647 meets most of the criteria we look for to be widely exploited.
Read MoreVulnerability Management
8 Types of High-Risk Cybersecurity Vulnerabilities
Cybersecurity vulnerabilities are weak spots within your environment and your assets—weaknesses that open you up to potential threats and increased risk. A...
READ MORE
Vulnerability Management
Why Vulnerability Scores Can’t Be Looked at in a Vacuum
Sometimes a number is just a number. Context – the information and environment around the number – is what really matters. This concept holds especially true...
READ MORE
Risk-Based Vulnerability Management
The Flaw of Averages in Averaging Flaws
Dr. Sam Savage became well known when he coined a mainstream term for a concept stats nerds had been familiar with for a long time – the Flaw of Averages. Here’...
READ MORE
Trending Vulns
Introducing Kenna’s Vuln of the Month Series
Yesterday was Patch Tuesday, so we’re calling today Exploit Wednesday. And with that, today we launch a new monthly blog series from Kenna Security. We call...
READ MORE
Customer
How Security and IT Can Leverage the Secrets to CX Success
Here at Kenna Security, I spend my days ensuring my team helps our customers get the most from their investment in Kenna Security. I believe our dedicated...
READ MORE
Employee Spotlight
Employee Spotlight: Latkes with Lora Rodstein
One business function that has faced a uniquely challenging role to play during the last 12 months is Human Resources. At the helm of this function here at...
READ MORE
5 Things Every CIO Should Know About VM
Read this eBook to learn what a modern vulnerability management approach means to your IT operation. You discover how it helps CIOs like you create more efficient and effective teams while reducing your company’s overall risk profile.
Download NowRisk-Based Vulnerability Management
Measuring Momentum in the Attacker-Defender Dynamic
Vulnerability management could accurately be described as a cat-and-mouse game. It’s a high-stakes contest between attackers looking to exploit discovered...
READ MORE
Vulnerability Management
Risk, Threat, or Vulnerability? How to Tell the Difference
In cybersecurity, risk is the potential for loss, damage or destruction of assets or data. Threat is a negative event, such as the exploit of a vulnerability.
READ MORE
Podcast
Risk, Measured: Power Laws and Security
We’re picking back up on our “Risk, Measured” series where we dive into specific concepts used to measure risk within the context of cybersecurity. We discuss...
READ MORE
Industry
Earn (ISC)² Credit With Kenna Education
We’re all too familiar with the shortage of cybersecurity talent. That’s why it’s fortunate that there are a number of educational paths to becoming a...
READ MORE
Podcast
Github as a Source for Exploits?
We look at the phenomena of exploit code moving from traditional and cybersecurity-centric databases like Exploit-DB and Metasploit and instead being...
READ MORE
Risk-Based Vulnerability Management
Now Playing: Insights On Demand from Kenna Katalyst
Experts have an urgent message for CISOs and IT execs: Focusing your vulnerability management efforts around risk will be a top priority for 2020-2021. They’...
READ MORE